The AlienVault Blogs: Taking On Today’s Threats
Latest

The most recent posts from across the AlienVault blogs.

Subscribe: Via Email | RSS

Labs

Late-breaking discoveries and in-depth analysis.

Subscribe: Via Email | RSS

How-To

Practical, how-to advice, tips and guidance.

Subscribe: Via Email | RSS

Companies required to comply with the Payment Card Industry Data Security Standard (PCI DSS) must meet a wide range of technical and operation requirements. The challenge organizations face regarding PCI compliance has shifted from achieving the minimum level required to satisfy PCI audit requirements to incorporating security best practices into everyday activities. Otherwise, the potential exists to achieve compliance yet… Read more

Posted in:
Tags: compliance, pci dss 3.0

It’s a given that nobody likes adware loaded on their new systems by the manufacturer but usually, it is no more than a nuisance and can be easily removed in most cases. However, when that software includes a major security flaw, making man-in-the-middle attacks infinitely easier to carry out, you have a major issue on your hands. Just… Read more

Posted in:
Tags: malware, correlation, adware, virus

MSSPs, like any other business, are a factor of it’s People, Process, and Product. This series will offer insight into each of those factors and offer practical ways to achieve success. What’s in a name? A device by any other name, will work just as well… if not better Now that you are past the… Read more

Posted in:
Tags: mssp, asset management, regex, naming convention

Building a solid security program takes time. Every organization is different. It's very important to assess your technology, and consider both internal and external threats. An assessment will reveal vulnerabilities. The remediation process will help you take full advantage of your existing security assets and point you at any gaps that need filling. Even once your defenses are in… Read more

Posted in:
Tags: compliance, security policy, security program

Mike Saurbaugh, Manager of Information Security at Corning Credit Union and Kevin Johnson, CEO of Secure Ideas presented "Security by Collaboration: Rethinking Red Teams versus Blue Teams” at CUISPA 2015. Mike represented the Blue Team side, as the internal guy who works with Kevin, as a hired-gun third party Red Team. Red Team focuses on adversarial probing of security at… Read more

Posted in:
Tags: red team, blue team, cuispa

Get Email Updates

Labs Research
Security Essentials
All Blogs

Gartner MQ

Featured Content

Interactive Demo